Skip to main content

Transit Security Update (2008) / Chapter Skim
Currently Skimming:


Pages 115-132

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 115...
... 114 APPENDIX C SURVEY QUESTIONNAIRE Agency Name: ___________________________________________________________ National Transit Database ID: ______________________________________________ Address: _________________________________City/State/Zip Code:_____________ Respondent Name: ________________________________ Title:________________________ Telephone: _________________ Fax:___________________ E-mail:______________ Transit Security Update TCRP Synthesis SF-13 PLEASE NOTE: The information requested for this survey will not be reported in a manner specific to you or your agency. Contact information will be used only for follow-up or clarification by the survey team and agency responses will be held in strictest security and confidentiality.
From page 117...
... 116 4. Please specify the attributes of the perpetrators of major security offenses reported to the National Transit Database, if any, in 2000 and 2006.
From page 119...
... 118 7. During 2006, how many of the following incidents or threats of terrorism occurred?
From page 120...
... 119 Please describe the above incidents in greater detail, especially if any of these incidents caused any fatalities, injuries, or property damage, or if there were multiple incidents of the same type.
From page 121...
... 120 10. Please note any trends in cyber-security breaches; if specific breaches have increased or decreased, please list them below: Increase Decrease a.
From page 122...
... 121 b. What are the sources of data on offenses already listed?
From page 123...
... 122 What major changes, if any, have been made at your agency in overall security and security practices since September 11, 2001?
From page 124...
... 123 II. SECURITY PRACTICES Please indicate security practices used by your system, including those to prevent or control violence and confrontational incidents and those to counter terrorism.
From page 125...
... 124 17. Access Control Purpose Modes Locations Year(s)
From page 126...
... 125 19. Transit Vehicle Design Purpose Modes Location Year(s)
From page 127...
... 126 21. Operational Strategies Purpose Modes Location Year(s)
From page 128...
... 127 23. Communications Security Purpose Modes Location Year(s)
From page 129...
... 128 25. Outreach, Education, Training, and Awareness Strategies What types of outreach, education, training and awareness strategies does your agency employ, excluding training courses provided to your employees?
From page 130...
... 129 Course Title:_________________________________________________ Provider: (In-house, NTI, TSI, APTA, other) ________________________ Delivery Method: Classroom Ƒ Workshop Ƒ Online, w/Instructor Ƒ Online, w/o Instructor Ƒ Video/DVD Ƒ Interactive CD Ƒ CD Ƒ Delivered to: Percent Hours/ Times/ Evaluation of Staff Session Year Method Transit Police/Security Staff Ƒ ____% _____ ____ __________ Frontline Employees Ƒ ____% _____ ____ __________ Supervisory Employees Ƒ ____% _____ ____ __________ Management Ƒ ____% _____ ____ __________ Course Title:_________________________________________________ Provider: (In-house, NTI, TSI, APTA, other)
From page 131...
... 130 Course Title:_________________________________________________ Provider: (In-house, NTI, TSI, APTA, other) ________________________ Delivery Method: Classroom Ƒ Workshop Ƒ Online, w/Instructor Ƒ Online, w/o Instructor Ƒ Video/DVD Ƒ Interactive CD Ƒ CD Ƒ Delivered to: Percent Hours/ Times/ Evaluation of Staff Session Year Method Transit Police/Security Staff Ƒ ____% _____ ____ __________ Frontline Employees Ƒ ____% _____ ____ __________ Supervisory Employees Ƒ ____% _____ ____ __________ Management Ƒ ____% _____ ____ __________ 27.

Key Terms



This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.